
pwnii
@pwnwithlove
Followers
2K
Following
3K
Media
42
Statuses
503
bug bounty lover, breaking stuff on @yeswehack & worldcuping 🇫🇷 at @Hacker0x01 || organizer of @esnhack, trying to keep hacking underground || CVE-2023-44352
ଘ(∩^o^)⊃━☆:・゚✧*:・゚✧✯♡❀
Joined November 2021
today with @Brumens2 we received a 50,000€ reward for discovering a bug in a public program !! don't be shy, go hunt in public programs too.@yeswehack ʚ(。˃ ᵕ ˂ )ɞ
56
26
465
RT @yeswehack: In the latest episode of #TalkiePwnii, @pwnwithlove analyses Ruby Treasure, a Dojo challenge by @Brumens2 💎. From regex bypa….
0
3
0
RT @yeswehack: Know much about finding and exploiting path traversal or arbitrary file read vulnerabilities? 🤔. Learn practical attacks lev….
0
9
0
i've made some android challenges - feel free to check them out if you're into that kind of stuff! they’re pretty rare in most CTFs :p. the last one is based on a real bug bounty I reported, and is linked to a real application I can control ;)
🚨 QUALIFIERS ARE NOW OPEN! . Good luck to all the challengers, the CTF will close tomorrow at 8 P.M (Paris time). ➡️ Join the Insurrection right here:
0
4
25
RT @yeswehack: Curious to find out how @CaidoIO could fit into your #BugBounty workflow? 🐞. In this special episode of #TalkiePwnii, @pwnwi….
0
12
0
RT @pentest_swissky: OwnAppV2, Proxying and Reversing a Flutter apk | BreizhCTF WU - @pwnwithlove .
0
38
0
i’m doing videos about writeups, i hope you’ll enjoy! this one is about python format string injection, and you can find more on the youtube channel ٩(^ᗜ^)و.
Curious about the solution to our Xmas Dojo chall? 👀. Watch episode 3 of #TalkiePwnii for the breakdown & pro hacking tips! @pwnwithlove demonstrates how to exploit a Python format string injection using insecure exception handling 🐍. #BugBountyTips.
0
4
30
RT @yeswehack: 📱 Want to find bugs in Android apps? Android apps are often included in our scopes. Frequently overlooked, they offer some v….
0
16
0
a few weeks ago, I received an award for a critical vulnerability submitted on @yeswehack -- Path Traversal (CWE-22) (˵>ᗜ<˵)! !! . this thread is literally how I discovered this vulnerability :p
Have you ever seen an HTTP response embedded directly in the body of your request?. Check out these tips to discover how and where to find (internal) path traversal vulnerabilities! 👇. #YesWeRHackers #BugBountyTips.
8
1
80
RT @yeswehack: Last Friday, we had the pleasure of holding an exclusive #LiveHackingEvent for cybersecurity students at @UYBHYS in partners….
0
8
0
i'm soooo glad, here's my first video on youtube! .there's a little easter-egg, will you find it? ٩(^ᗜ^ )و ´-.
🎬 #TalkiePwnii is LIVE!. Introducing our new series starring @pwnwithlove! In each video, Pwnii will break down Dojo challenges, sharing various solutions & technical tips 😎. Catch the first episode about our ‘Shell Escape’ challenge 👇. #YesWeRHackers.
6
6
49
during this first round, we finished waaay ahead with team france !! 🇫🇷٩(^ᗜ^ )و.GG to everyone, it was incredible and i can't wait for the next round. special shout out to @Kuromatae666 for being an awesome mate, and to @Blaklis_ for being the best ambassador !!
The results are in!🥇. Congratulations to these 32 teams who will move on to the Group Round of the 2024 #AmbassadorWorldCup! 🙌 . The next round kicks off at the end of August! Stay tuned for the latest info, and read more about the AWC here.
7
1
71
last week, i got some rewards for three critical vulnerabilities submitted on @yeswehack (੭˃ᴗ˂)੭ !! OS Command Injection (CWE-78). #YesWeRHackers
4
0
106
what a pleasure to receive new posters every quarter ! +3 new ones, thanks again @yeswehack :p
10
1
173
have a look at the new dojo, i did it in collaboration with @Brumens2 ! ヾ(˶ᵔ ᗜ ᵔ˶)
A new Dojo challenge has arisen: AI Image Generator - Dojo #34. The 3 best reports will win exclusive swag! 🎁.Submit your solution before 02th August 2024! 🗓️. Enter the challenge: #YesWeRHackers #CTF #BugBounty
4
7
38